Operational requirements for security measures

被引:0
|
作者
Spaight, WHT
机构
关键词
D O I
10.1109/CCST.2000.891169
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Many physical and procedural security measures have not met the users' needs because the implications of what is required have not been fully thought through. An Operational Requirement is a statement of needs based upon a thorough and systematic assessment of the problems to be solved and the hoped for outcomes. It should provide the link between a high level need and the system procurement process. It is easy to consider in principle but hard to develop in practice. The paper will explain the development of an Operational Requirement and give examples of where it has and has not been used. Examples will include the procurement of equipment and the procedures and numbers needed for a guarding regime.
引用
收藏
页码:64 / 70
页数:7
相关论文
共 50 条
  • [1] Security measures and determination of capital requirements
    Berliet, JP
    [J]. GLOBAL RISK MANAGEMENT: FINANCIAL, OPERATIONAL, AND INSURANCE STRATEGIES, 2002, 3 : 157 - 162
  • [2] Utilizing security requirements engineering methods for operational security maintenance purposes
    Abuosba, Khalil
    El-Sheikh, Asim
    Martin, Clemens
    [J]. 2008 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-4, 2008, : 1763 - 1767
  • [3] Operational security requirements for large collaborative compute infrastructures
    Khurana, Himanshu
    Basney, Jim
    Welch, Von
    Campbell, Roy
    [J]. 2006 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2006, : 374 - +
  • [4] Conflicts Between Security and Privacy Measures in Software Requirements Engineering
    Ganji, Daniel
    Mouratidis, Haralambos
    Gheytassi, Saeed Malekshahi
    Petridis, Miltos
    [J]. GLOBAL SECURITY, SAFETY AND SUSTAINABILITY: TOMORROW'S CHALLENGES OF CYBER SECURITY, ICGS3 2015, 2015, 534 : 323 - 334
  • [5] OPERATIONAL AND MOBILIZATION MEASURES OF THE SOVIET STATE SECURITY BODIES IN 1939 - JUNE OF 1941
    Danylenko, Vasyl
    [J]. SKHIDNOIEVROPEISKYI ISTORYCHNYI VISNYK-EAST EUROPEAN HISTORICAL BULLETIN, 2021, (21): : 138 - 148
  • [6] VANET: Its Applications, Security Requirements, Types of Attacks and its Corrective Measures
    Choudhary, Shivani
    Purohit, Kamlesh
    [J]. 2018 INTERNATIONAL CONFERENCE ON COMPUTING, POWER AND COMMUNICATION TECHNOLOGIES (GUCON), 2018, : 883 - 888
  • [7] General Requirements and Security Architecture for Mobile Phone Anti-Cloning Measures
    Gepko, Igor
    [J]. IEEE EUROCON 2015 - INTERNATIONAL CONFERENCE ON COMPUTER AS A TOOL (EUROCON), 2015, : 231 - 236
  • [8] MEASURES ON OPERATIONAL LOGICS
    BUGAJSKI, S
    [J]. ZEITSCHRIFT FUR NATURFORSCHUNG SECTION A-A JOURNAL OF PHYSICAL SCIENCES, 1979, 34 (06): : 785 - 786
  • [9] ON MEASUREMENT OF OPERATIONAL SECURITY
    BROCKLEHURST, S
    LITTLEWOOD, B
    OLOVSSON, T
    JONSSON, E
    [J]. IEEE AEROSPACE AND ELECTRONIC SYSTEMS MAGAZINE, 1994, 9 (10) : 7 - 16
  • [10] Operational Security - A Coming Evolution of Railway Operational Procedures Under the IT Security Threat
    Huang, Po-Chi
    Milius, Birgit
    [J]. RELIABILITY, SAFETY, AND SECURITY OF RAILWAY SYSTEMS: MODELLING, ANALYSIS, VERIFICATION, AND CERTIFICATION, RSSRAIL 2016, 2016, 9707 : 69 - 78